CN107844714A - A kind of verification method and device, computer installation, readable storage medium storing program for executing - Google Patents
A kind of verification method and device, computer installation, readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN107844714A CN107844714A CN201711059135.5A CN201711059135A CN107844714A CN 107844714 A CN107844714 A CN 107844714A CN 201711059135 A CN201711059135 A CN 201711059135A CN 107844714 A CN107844714 A CN 107844714A
- Authority
- CN
- China
- Prior art keywords
- verification
- data
- module
- default
- memory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Debugging And Monitoring (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
The embodiment of the invention discloses a kind of verification method and device, computer installation, readable storage medium storing program for executing; for finding mistake in time in the distributed file system designed based on stack module; prevent error diffusion; more reliable protection is provided; help orientation problem; so as to help to design more reliable distributed file system, data integrity protection is better achieved.Present invention method is applied to the distributed file system based on the design of stack module, and distributed file system includes N number of module, and N is the positive integer not less than 2, and this method includes:When module M receives the first data, detect whether default region of memory is stored with the first verification corresponding to the first data and M is the positive integer no more than N;If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
Description
Technical field
The present invention relates to data processing field, more particularly to a kind of verification method and device, computer installation, readable storage
Medium.
Background technology
Keep the most important thing that data integrity is modern memory systems.At present, have various technologies be developed and
Using improving the protection of data integrity, most common of which, it is most popular be exactly verification and method.
Traditional is generally divided into two classes for the verification of storage system and method:One kind is end-to-end verification, another kind of to be
Disk verify and.Wherein, for end-to-end verification, data is usually transmitted to back-end system interface in application program and starts and makes
With verification and protection, afterwards until data are read out just using verifying and verified, but mistake hair like this be present
The defects of now slow, and if when data do not return, cannot just carry out checksum validation.And disk verifies and writes number in disk
According to when can with the verification of calculating and together with store, being read out afterwards in data can also be using verification and to be verified.
But end-to-end verification or disk verify and all not to the heap similar to glusterfs (a kind of distributed file system)
Each intermodule of stacked file system carries out checksum validation, to realize the protection of data integrity.
The content of the invention
The embodiments of the invention provide a kind of verification method and device, computer installation, readable storage medium storing program for executing, in base
Find mistake in time in the distributed file system of stack module design, prevent error diffusion, there is provided more reliable protection,
Orientation problem is helped, so as to help to design the more reliable distributed file system based on the design of stack module, preferably
Realize data integrity protection.
In view of this, first aspect present invention provides a kind of verification method, applied to point designed based on stack module
Cloth file system, distributed file system include N number of module, and N is the positive integer not less than 2, it may include:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data
Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
Further, the first verification whether is stored with before in the default region of memory of detection, method also includes:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
Further, method also includes:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
Further, verification switch is preset according to corresponding to the height of load opens W module to be included:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Further, when M is 1, it is opening to preset verification switch;
When M is N, it is opening to preset verification switch.
Further, method also includes:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification
With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
Further, method also includes:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage
Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data
At least one of, and using second verification and as first verification with.
Further, when default storage region be stored with the first verification and with the first verification and corresponding second data the
During two data lengths, verified using the first data generation second with before, method also includes:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
Further, when default storage region, which is also stored with detection, presets magic number, whether the second data length is being detected
Before changing, method also includes:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
Further, during the second sampled data of the predeterminated position for being also stored with the second data when default storage region, if
Second verification and with first verification and it is identical, then sending the first data to module M+K includes:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
Second aspect of the present invention provides a kind of checking device, applied to the distributed field system designed based on stack module
System, distributed file system include N number of module, and N is the positive integer not less than 2, it may include:
First detection unit, for when module M receives the first data, detect whether default region of memory is stored with the
First verification corresponding to one data and, M is positive integer no more than N;
Generation unit, for when default region of memory be stored with the first verification and when, then utilize the first data generation second
Verification and;
Comparison unit, for verifying and being contrasted by the second verification and with first;
First determining unit, for when second verifies and verify and differ with first, it is determined that the first data are in mould
There is mistake in block M.
Further, device also includes:
Whether the second detection unit, the default verification switch for detection module M are opened;
First trigger element, for when module M default verification is switched and opened, then it is pre- to trigger the detection of the first detection unit
If region of memory whether be stored with the first verification and.
Further, device also includes:
Second determining unit, for determining the load of distributed file system;
Opening unit, for presetting verification switch according to corresponding to the height of load W module of unlatching, W is no more than N's
Positive integer.
Further, opening unit, it is specifically used for:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Further, when M is 1, it is opening to preset verification switch;
When M is N, it is opening to preset verification switch.
Further, device also includes:
Transmitting element, for when default region of memory do not store the first verification and, or module M default verification switch do not open
Open, or the second verification and with the first verification and it is identical when, then the first data are sent to module M+K, K is -1 or 1.
Further, device also includes:
Memory cell, for when default region of memory do not store the first verification and when, default storage region store second
Verification and, or the verification of storage second and with default magic number, the first data length of the first data, the first data predeterminated position
At least one of first sampled data, and using second verification and as first verification with.
Further, when default storage region be stored with the first verification and with the first verification and corresponding second data the
During two data lengths, device also includes:
3rd detection unit, for detecting whether the second data length changes;
Second trigger element, for when the second data length does not change, then triggering generation unit using the first number
According to generation second verification and.
Further, when default storage region, which is also stored with detection, presets magic number, device also includes:
4th detection unit, for detecting whether default magic number changes;
3rd trigger element, for when default magic number does not change, then triggering the number of the 3rd detection unit detection second
Whether changed according to length.
Further, during the second sampled data of the predeterminated position for being also stored with the second data when default storage region, hair
Unit is sent, is specifically used for:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
Third aspect present invention provides a kind of computer installation, applied to the distributed document designed based on stack module
System, distributed file system include N number of module, and N is the positive integer not less than 2, and computer installation includes processor, processor
During for performing the computer program stored in memory, following steps are realized:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data
Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
Fourth aspect present invention provides a kind of computer-readable recording medium, applied to point designed based on stack module
Cloth file system, distributed file system include N number of module, and N is the positive integer not less than 2, is stored on readable storage medium storing program for executing
There is computer program, when computer program is executed by processor, realize following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data
Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
The embodiments of the invention provide a kind of verification method, when in the distributed file system designed based on stack module
Module M when receiving the first data, can detect whether default region of memory is stored with first corresponding to the first data in advance
Verification and, first verification and storage in the case of, can utilize module M receive the first data generation second verification and,
And can verify and be contrasted by the second verification and with first, to be verified to the first data that module M is received, if second
Verification and with the second verification and differing, then can determine that the first data mistake occur in module M, then can immediately positioning the
The Error Location of one data, and the upload of the first data can be blocked in time or issued, the diffusion of the first data of mistake is prevented,
More reliable protection is provided, so as to help to design the more reliable distributed file system based on the design of stack module, more
Realize data integrity protection well.
Brief description of the drawings
Fig. 1 is verification method one embodiment schematic diagram in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 3 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 4 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 6 is that device one embodiment schematic diagram is verified in the embodiment of the present invention;
Fig. 7 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Fig. 8 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Fig. 9 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 10 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 11 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 12 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention.
Embodiment
The embodiments of the invention provide a kind of verification method and device, computer installation, readable storage medium storing program for executing, in base
Find mistake in time in the distributed file system of stack module design, prevent error diffusion, there is provided more reliable protection,
Orientation problem is helped, so as to help to design the more reliable distributed file system based on the design of stack module, preferably
Realize data integrity protection.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model that the present invention protects
Enclose.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, "
The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage
The data that solution so uses can exchange in the appropriate case, so that the embodiments described herein can be with except illustrating herein
Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment need not limit
In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production
The intrinsic other steps of product or equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real
Applying verification method one embodiment in example includes:
101st, when module M receives the first data, detect whether default region of memory is stored with corresponding to the first data
First verification and;
In the present embodiment, the distributed file system based on the design of stack module can include N number of module, pass through this point
Cloth file system can be write first data into disk, returned after can also the first data be read from disk/solid-state disk
Return.In the write-in of the first data or reading process, the first data can with distributed file system a module upload or
It is issued to another module.Wherein, N is the positive integer not less than 2.
In the write-in of the first data or reading process, when the module M in the distributed file system receives the first number
According to when, can detect in advance default region of memory whether be stored with corresponding to the first data the first verification and.
Wherein, the first verification and using the first data by verifying or first to enter the first of distributed file system
Data generate, and are stored in default region of memory, such as cache, for examining the first data mould in distributed file system
Whether mistake is occurred in the transmitting procedure of block, and specific generating mode is as follows:
The first:
When receiving the write request for the first data, and heap is initially entered from upper level applications in the first data
During the module K of stacked file system, first verifies and first data can be utilized to generate, and is stored in default region of memory
In, for checking of first data when sending other modules into distributed file system.
Second:
When receiving the read requests for the first data, and pulled back in the first data since disk/solid-state disk
During the module K of stackable file system, first verifies and first data can be utilized to generate, and is stored in and default internal memory
In region, for checking of first data when sending other modules into distributed file system.
The third:
When receiving the write request or read requests for the first data, when the first data are from distributed file system
In modules A when sending to another module B, if the first data in modules A by checking, that is, giving tacit consent to the first data just
Really, then the second verification of the first data generation that can be received by the use of modules A and as the first verification with and this can be made
The second verification for the first verification sum and it is stored in default region of memory, can be with for the first data when sending to module B
The first data that module B is received are verified.
It is understood that in such a mode, default storage region there may be multiple first verifications and, i.e., each
After the first data that module receives are by checking, it can generate corresponding first verification and be stored, can also only be deposited
And, but the first verification and generated by received using next module and the first data by checking in one first verification
Verification and renewal, are not specifically limited herein.
It should be noted that when default storage region exist multiple first verifications and when, this multiple first verification and can be with
Mapping relations are established between corresponding module and are distinguish between, in favor of it is proper use of it is corresponding first verification and.
In the present embodiment, N is the positive integer not less than 2, and M, K, A, B are the positive integer no more than N.
If the 102nd, preset region of memory be stored with the first verification and, using the first data generation second verification and, and will
Second verifies and verifies and contrasted with first;
In the present embodiment, if default storage region is stored with the first verification and can utilize the first data generation second
Verification and, and can by second verification and with first verification and contrasted, with judge second verification and whether with first verify
With it is identical.
In the present embodiment, prior art is referred to using the method for the first data generation the second verification sum, herein no longer
Repeat.
If the 103rd, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
In the present embodiment, if second verifies and verify and differ with first, it can determine that the first data go out in module M
Existing mistake.
Further, it is determined that the first data after mistake occurs in module M, can block the first number in time with locating module M
According to sending to pulling back to a upper module or being issued to next module, reporting an error for the first data can also be carried out, to cause work
Error reason of first data in module M can be analyzed by making personnel.
If the 104th, preset region of memory do not store the first verification and, if or second verification and with first verification and it is identical,
First data are sent to module M+K.
In the present embodiment, if default region of memory does not store the first verification and can sent the first data to module M
+K.Wherein, K can be -1 or 1.
Specifically, what ought be received is the write request of the first data, K can be 1, i.e. the first data pass through in module M
After checking, the first data can be sent with slave module M to module M next module;And when receive be the first data reading
Request is taken, K can be -1, i.e. after module M is by checking, the first data can be sent to module M's the first data with slave module M
A upper module.
It is understood that in the present embodiment, if the second verification and with the first verification and identical, the first number can be determined
Do not occur mistake according in module M, then can also slave module M the first data are sent to module M+K.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M
After by mistake, the second verification of the first data that can be received as needed using module M generation and default region of memory is stored in
In, this second verification and can update the first verification and, can also without renewal, be not specifically limited herein.
It should be noted that in the present embodiment, first module of distributed file system can be module 1, can also
For module N, module 1 to module N is to represent a kind of sortord of N number of module, is not specifically limited herein.
In the present embodiment, when the module M in the distributed file system designed based on stack module receives the first number
According to when, can detect in advance default region of memory whether be stored with corresponding to the first data the first verification and, in the first verification and
In the case of storage, can utilize module M receive the first data generation second verification and, and can by second verification and with
First verifies and is contrasted, to be verified to the first data that module M is received, if second verifies and with the second verification and not
It is identical, then it can determine that the first data mistake occur in module M, then the Error Location of the first data can be immediately positioned, and
The upload of the first data can be blocked in time or is issued, and prevent the diffusion of the first data of mistake, there is provided more reliable protection, from
And help to design the more reliable distributed file system based on the design of stack module, data integrity guarantor is better achieved
Shield.
Referring to Fig. 2, another embodiment of verification method includes in the embodiment of the present invention:
201st, when module M receives the first data, whether detection module M default verification switch is opened;
In the present embodiment, based on stack module design distributed file system modules can be respectively equipped with it is pre-
If verification switch, the default verification switch can enter Mobile state and turn off or on.When module M default verification is switched and opened,
Mean that module M the first data received can be verified, conversely, being then intended to directly pull back to the first data
A upper module is issued to next module.Thus, when module M receives the first data, can first detection module M it is pre-
If whether verification switch is opened.
Wherein, presetting verification switch includes write check switch or read check switch, and writing for the first data is directed to when receiving
When entering to ask, the default verification switch can be that write check switchs, and when receiving the read requests for the first data, should
Default verification switch can be that read check switchs.
In actual applications, can basis when in N number of module of the distributed file system designed based on stack module
The default verification for opening W module therein is needed to switch, concrete mode is as follows:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
Specifically, the load of above-mentioned distributed file system can be divided into Three Estate, it is assumed that provided with load threshold T1,
T2, then when load is higher than T1, it may be determined that be high capacity, when loading in the range of T1, T2, it may be determined that in being
Load, when load is less than T2, it may be determined that be low-load.According to the different brackets of load, the mould of varying number can be opened
The default verification switch of block, load is higher, and the quantity for closing the module of default verification switch is more.It is understood that this reality
Other manner can also be used by applying the classification of the grade of load in example on distributed file system, and the present embodiment is only for example
It is bright.
Thus,, can be with after the load for determining above-mentioned distributed file system in the write-in of the first data or reading process
It is determined that the now grade of load of distributed file system, so that it is determined that opening the quantity of the module of default verification switch.
Further,, can be with when needing to open to presetting verification switch corresponding to W module in the present embodiment
W module is selected in N number of module of distributed file system, selection mode is as follows:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Specifically, in N number of module of distributed file system, the importance of N number of module can be first determined, and can incite somebody to action
The importance of N number of module according to from high to low principle sort, then can according to the height of the load of distributed file system,
The W forward module of selected and sorted in N number of module, and open and verification switch is preset corresponding to this W module.Pass through such a side
Formula, intermodule accordingly verification and the expense for calculating and verifying can be effectively reduced, so as in the negative of distributed file system
When carrying higher, it is possible to reduce influence of the high capacity to systematic function.
In the present embodiment, optionally, when M is 1, it can be opening to preset verification switch, when M is N, preset school
It can also be opening to test switch, i.e., in N number of module of distributed file system, first module and last module pair
The default verification switch answered is opened, to improve the detectability for occurring mistake on read/write path to the first data.
If the 202, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
If the 203rd, preset region of memory be stored with the first verification and, using the first data generation second verification and, and will
Second verifies and verifies and contrasted with first;
If the 204th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The phase that step 202 in the present embodiment describes to step 204 with step 101 in embodiment illustrated in fig. 1 to step 103
Hold inside the Pass identical, here is omitted.
The 205th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, if or the
Two verification and with first verification and it is identical, then the first data are sent to module M+K.
In the present embodiment, if module M default verification switch is not opened, the first data can be sent to module M+K.
Other related contents of step 205 may be referred to what is illustrated in embodiment illustrated in fig. 1 in step 104 in the present embodiment
Content, here is omitted.
Based on embodiment illustrated in fig. 2, the distributed field system based on the design of stack module is utilized to the first data below
The write-in of system is illustrated with reading process:
The first data write request from last time application program enter distributed file system first module (first
The write check switch of individual module is opened) when, the verification of the first data generation first can be utilized and and be stored in default region of memory
In, then the first data can be issued to second module from first module, if the write check switch of second module closes
Close, then can be directly by the first data distributing to the 3rd module, can profit if the write check switch of second module is opened
The verification of the first data generation second that is received with second module and, and with the first verification of default region of memory and carrying out pair
Than, if first verifies and verify and differ with second, it can determine that the first data mistake occur in second module, if the
One verification and with the second verification and identical, then can continue the first data distributing to the 3rd module, like this one by one
Module is walked downward, and is write until the first data in disk/solid-state disk.
Meanwhile for the read requests for the first data, enter distribution when reading the first data from disk/solid-state disk
During bottom module (the read check switch of bottom module is opened) of file system, the first data generation read can be utilized
First verification and, and be stored in default region of memory, then the first data can be pulled back to reciprocal the from bottom module
Two modules, if the read check switch of penultimate module is closed, directly the first data can be pulled back to third from the bottom
Individual module, if the read check switch of penultimate module is opened, the first number that penultimate module can be utilized to receive
According to the verification of generation second and, and with the first of default region of memory the verification and being contrasted, if the first verification and with the second verification
With differ, then can determine that the first data mistake occur in penultimate module, if first verification and with second verification and
It is identical, then it can continue the first data pulling back to third last module, module is up walked one by one like this, until handle
First data return to user.
Referring to Fig. 3, another embodiment of verification method includes in the embodiment of the present invention:
301st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 302, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
Step 301 in this implementation is identical to step 202 with the step 201 in embodiment illustrated in fig. 2 to step 302, this
Place repeats no more.
If the 303rd, preset region of memory be stored with the first verification and, and be stored with the first verification and corresponding second data
Whether the second data length, the second data length of detection change;
In the present embodiment, if default region of memory be stored with the first verification and, and be stored with the first verification and corresponding the
Second data length of two data, then it can detect whether the second data length changes in advance.
Specifically, for the first data verified using passing through or enter due to the first verification and for the first time distributed file system
The first data generation, then understand the second data be by verify the first data or enter distributed file system for the first time
The first data, then by detect the second data the second data length whether change, the first data can be detected in phase
Whether there is mistake in the write-in answered or reading process.
If the 304, the second data length does not change, using the verification of the first data generation second and, and by the second school
Test and verify and contrasted with first;
In the present embodiment, if the second data length does not change, it can be initially believed that the first data do not occur mistake,
And can verify and be contrasted using the first verification and second with being generated using the first data, with further to the first data
It is made whether the checking of mistake occur.
It is understood that in the present embodiment, if the second data length changes, then default memory field can be determined
First in domain verifies and has malfunctioned, then the first verification can not be utilized and to the first data verification, to reduce system-computed
Load.
Further, in the present embodiment, after determining that the second data length of the second data changes, second can be carried out
Data length reports an error, to allow staff to analyze the error reason of the second data length.
If the 305th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The 306th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, if or the
Two verification and with first verification and it is identical, then the first data are sent to module M+K.
Step 304 in the present embodiment is identical to step 205 with the step 203 in embodiment illustrated in fig. 2 to step 306,
Here is omitted.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M
After by mistake, the first data length of the first data can also be stored in default region of memory, first data length can be more
New second data length, it can also be not specifically limited herein without renewal.
Referring to Fig. 4, another embodiment of verification method includes in the embodiment of the present invention:
401st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 402, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
Step 401 in this implementation is identical to step 302 with the step 301 in embodiment illustrated in fig. 3 to step 402, this
Place repeats no more.
If the 403rd, preset region of memory be stored with the first verification and, and be stored with detection preset magic number, detect preset magic number
Whether change;
In the present embodiment, if default region of memory be stored with the first verification and, and be stored with default magic number, then can be advance
Detect whether the second data length changes.
Specifically, due to magic number be it is fixed, then in the present embodiment, once the default magic number of default region of memory occurs
Change, then can be defaulted as the first verification and be changed with the second data length of the second data, conversely, then can consider
First verifies and is not malfunctioned with the second data length of the second data.
If the 404, presetting magic number not change, and it is stored with the second data length of the first verification and corresponding second data
Degree, then detect whether the second data length changes;
It is understood that in the present embodiment, changed if presetting magic number, then the with the second data can be determined
Two data lengths have malfunctioned, then the second data length of the second data can not be detected, be born with reducing system-computed
Carry.
If the 405, the second data length does not change, using the verification of the first data generation second and, and by the second school
Test and verify and contrasted with first;
If the 406th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The 407th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, or second
Verification and with first verification and it is identical, then the first data are sent to module M+K.
Step 404 in the present embodiment is identical to step 306 with the step 303 in embodiment illustrated in fig. 3 to step 407,
Here is omitted.
Above-mentioned embodiment illustrated in fig. 3 and embodiment illustrated in fig. 4 can first verification and before use, first to first verification and
Whether error is tested, to avoid the first bad checksum but the first data correctly judge scene by accident, and then can be effectively
False Rate is reduced, improves system reliability.
Referring to Fig. 5, another embodiment of verification method includes in the embodiment of the present invention:
501st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 502, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
If the 503rd, preset region of memory be stored with the first verification and, and be stored with detection preset magic number, detect preset magic number
Whether change;
If the 504, presetting magic number not change, and it is stored with the second data length of the first verification and corresponding second data
Degree, then detect whether the second data length changes;
If the 505, the second data length does not change, using the verification of the first data generation second and, and by the second school
Test and verify and contrasted with first;
If the 506th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
Step 501 in this implementation is identical to step 406 with the step 401 in embodiment illustrated in fig. 4 to step 506, this
Place repeats no more.
If the 507th, second verification and with first verification and it is identical, and be stored with the predeterminated position of the second data second sampling
Data, then the second sampled data and the first sampled data are contrasted;
In the present embodiment, if the second verification and with the first verification and identical, and be stored with the predeterminated position of the second data
Second sampled data, then the second sampled data and the first sampled data can be contrasted.
Specifically, the first sampled data is acquired for the predeterminated position in the first data, because the second data are
The first data or first the first data for entering distributed file system by checking, then contrast the first hits by detecting
According to the second sampled data of the predeterminated position with the second data, the first data can be detected in corresponding write-in or reading process
Whether mistake is occurred.Thus, it is possible to prevent the first verification and do not malfunction, but the first data after distorting and the first number before distorting
According to the verification of generation and identical and be mistakenly considered to fail to judge caused by the first data are not distorted.
Wherein, in order to avoid the second sampled data is excessive and causes space hold of second data to default region of memory,
The size of second data is can be with 200 times to 1000 times of the size of the second sampled data.
The 508th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, or second
The sampled data of sampled data first is identical, then sends the first data to module M+K.
Step 508 in the present embodiment is identical with the step 407 in embodiment illustrated in fig. 4, and here is omitted.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M
After by mistake, the first sampled data of the predeterminated position of the first data can also be stored in default region of memory, first sampling
Data can update the second sampled data, can also be not specifically limited herein without renewal.
It is understood that the explanation based on above-described embodiment, when default region of memory do not store the first verification and when, can
With in the verification of default storage region storage second and, or, can also store the second verification and with default magic number, the first data
At least one of the first sampled data of predeterminated position of first data length, the first data, and using the second verification and as
First verifies and then in actual applications, can also include more embodiments, above-described embodiment is by way of example only.
It should be noted that default storage region be stored with the second verification and with default magic number, the first number of the first data
, can be by the second verification and with presetting during according at least one of length, the first sampled data of the predeterminated position of the first data
At least one of magic number, the first data length, first sampled data are handled according to preset format, obtain the 3rd data,
And default region of memory is stored in the form of the 3rd data, it is not specifically limited herein.
Preferably, when being tampered due to data, the possibility distorted from the head and the tail both ends of data is larger, then is sent out to improve
Existing second verification sum distorts possibility, the second verification and the head and the tail both ends that can not be located at the 3rd data.
The verification method in the embodiment of the present invention is illustrated respectively above, below to testing in the embodiment of the present invention
Card device illustrates, and the checking device is applied to the distributed file system based on the design of stack module, distributed document
System includes N number of module, and N is the positive integer not less than 2:
Referring to Fig. 6, verify that device one embodiment includes in the embodiment of the present invention:
First detection unit 601, for when module M receives the first data, detecting whether default region of memory stores
There is the first verification corresponding to the first data and M is the positive integer no more than N;
Generation unit 602, for when default region of memory be stored with the first verification and when, then utilize the first data generation the
Two verification and;
Comparison unit 603, for verifying and being contrasted by the second verification and with first;
First determining unit 604, for when second verifies and verify and differ with first, it is determined that the first data exist
There is mistake in module M.
Optionally, in some embodiments of the invention, based on Fig. 6, as shown in fig. 7, device can further include:
Whether the second detection unit 605, the default verification switch for detection module M are opened;
First trigger element 606, for when module M default verification is switched and opened, then triggering the inspection of the first detection unit
Survey default region of memory whether be stored with the first verification and.
Optionally, in some embodiments of the invention, based on Fig. 7, as shown in figure 8, device can further include:
Second determining unit 607, for determining the load of distributed file system;
Opening unit 608, for according to the height of load open W module corresponding to preset verification switch, W for no more than
N positive integer.
Optionally, in some embodiments of the invention, opening unit 607, can further be specifically used for:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Optionally, in some embodiments of the invention, based on Fig. 8, as shown in figure 9, device can further include:
Transmitting element 609, for when default region of memory do not store the first verification and, or module M default verification switch
Do not open, or the second verification and with the first verification and it is identical when, then the first data are sent to module M+K, K is -1 or 1.
Optionally, in some embodiments of the invention, based on Fig. 9, as shown in Figure 10, device can also be wrapped further
Include:
Memory cell 610, for when default region of memory do not store the first verification and when, in default storage region storage the
Two verification and, or storage second verification and with default magic number, the first data length of the first data, the first data predeterminated position
At least one of the first sampled data, and using the second verification and as the first verification with.
Optionally, in some embodiments of the invention, based on Figure 10, as shown in figure 11, when default storage region stores
Have the first verification and with first verification and corresponding second data the second data length when, device can further include:
3rd detection unit 611, for detecting whether the second data length changes;
Second trigger element 612, first is utilized for when the second data length does not change, then triggering generation unit
Data generation second verification and.
Optionally, in some embodiments of the invention, based on Figure 11, as shown in figure 12, when default storage region is also deposited
Contain detection preset magic number when, device can further include:
4th detection unit 613, for detecting whether default magic number changes;
3rd trigger element 614, for when default magic number does not change, then triggering the 3rd detection unit detection second
Whether data length changes.
Optionally, in some embodiments of the invention, when default storage region is also stored with the default position of the second data
During the second sampled data put, transmitting element 208, can further it be specifically used for:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
The angle of slave module functional entity is retouched to the five application page display device in the embodiment of the present invention above
State, the computer installation in the embodiment of the present invention is described from the angle of hardware handles below, the computer installation can answer
For the distributed file system designed based on stack module, distributed file system includes N number of module, and N is not less than 2
Positive integer:
Computer device one embodiment of the embodiment of the present invention includes:
Processor and memory;
Memory is used to store computer program, can when processor is used to perform the computer program stored in memory
To realize following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data
Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also
To realize following steps:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also
To realize following steps:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also
To realize following steps:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also
To realize following steps:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification
With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also
To realize following steps:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage
Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data
At least one of, and using second verification and as first verification with.
In some embodiments of the invention, when default storage region is stored with the first verification and is verified with first and corresponding
The second data the second data length when, processor is used for when performing the computer program stored in memory, can also be real
Existing following steps:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
In some embodiments of the invention, when default storage region, which is also stored with detection, presets magic number, processor is used
When the computer program stored in memory is performed, following steps can also be realized:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
In some embodiments of the invention, when default storage region is also stored with the second of the predeterminated position of the second data
During sampled data, when processor is used to perform the computer program stored in memory, following steps can also be realized:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
It is understood that also may be used described in computing device in the computer installation of described above during computer program
To realize the function of each unit in above-mentioned corresponding each device embodiment, here is omitted.Exemplary, the computer journey
Sequence can be divided into one or more module/units, and one or more of module/units are stored in the memory
In, and by the computing device, to complete the present invention.One or more of module/units can be can complete it is specific
The series of computation machine programmed instruction section of function, the instruction segment are used to describe the computer program in the checking device
Implementation procedure.For example, the computer program can be divided into each unit in above-mentioned checking device, each unit can be realized
The concrete function that accordingly checking device illustrates as described above.
The computer installation can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set
It is standby.The computer installation may include but be not limited only to processor, memory.It will be understood by those skilled in the art that processor,
Memory is only the example of computer installation, does not form the restriction to computer installation, can be included more or less
Part, some parts or different parts are either combined, such as the computer installation can also be set including input and output
Standby, network access equipment, bus etc..
The processor can be CPU (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable GateArray, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng the processor is the control centre of the computer installation, utilizes various interfaces and the whole computer installation of connection
Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization
The various functions of computer installation.The memory can mainly include storing program area and storage data field, wherein, storage program
Area can storage program area, application program needed at least one function etc.;Storage data field can store the use according to terminal
Data created etc..In addition, memory can include high-speed random access memory, non-volatile memories can also be included
Device, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated
State memory device.
Based on method for writing data, present invention also offers a kind of computer-readable recording medium, this is computer-readable to deposit
Storage media can be applied to the distributed file system based on the design of stack module, and distributed file system includes N number of module, N
For the positive integer not less than 2, computer program is stored with the computer-readable recording medium, computer program is held by processor
During row, it is possible to achieve following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data
Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, following steps can also be realized:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, following steps can also be realized:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, following steps can also be realized:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, following steps can also be realized:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification
With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor
When, following steps can also be realized:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage
Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data
At least one of, and using second verification and as first verification with.
In some embodiments of the invention, when default storage region is stored with the first verification and is verified with first and corresponding
The second data the second data length when, when the computer program of computer-readable recording medium storage is executed by processor,
Following steps can also be realized:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
In some embodiments of the invention, when default storage region, which is also stored with detection, presets magic number, computer can
When the computer program of reading storage medium storage is executed by processor, following steps can also be realized:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
In some embodiments of the invention, when default storage region is also stored with the second of the predeterminated position of the second data
During sampled data, when the computer program of computer-readable recording medium storage is executed by processor, following step can also be realized
Suddenly:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
If it is understood that the integrated unit is realized in the form of SFU software functional unit and is used as independent production
Product are sold or in use, can be stored in a corresponding computer read/write memory medium.Based on such understanding, this hair
The bright all or part of flow realized in above-mentioned corresponding embodiment method, correlation can also be instructed by computer program
Hardware is completed, and described computer program can be stored in a computer-readable recording medium, the computer program is being located
Manage device perform when, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program includes computer program generation
Code, the computer program code can be source code form, object identification code form, executable file or some intermediate forms
Deng.The computer-readable medium can include:Any entity or device, the record of the computer program code can be carried
It is medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-OnlyMemory), random
Access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need
It is noted that the content that includes of the computer-readable medium can be according to legislation in jurisdiction and patent practice will
Ask and carry out appropriate increase and decrease, such as in some jurisdictions, do not included according to legislation and patent practice, computer-readable medium
Electric carrier signal and telecommunication signal.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (13)
1. a kind of verification method, applied to the distributed file system designed based on stack module, the distributed field system
System includes N number of module, and the N is the positive integer not less than 2, it is characterised in that including:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to first data
Verification and, the M is positive integer no more than N;
If so, then using first data generation second verification and, and by described second verify and with described first verification and
Contrasted;
If described second verifies and verifies and differ with described first, it is determined that first data occur in the module M
Mistake.
2. according to the method for claim 1, it is characterised in that whether be stored with first in the default region of memory of the detection
With before, methods described also includes for verification:
Whether the default verification switch for detecting the module M is opened;
If so, then trigger the default region of memory of detection whether be stored with the first verification and the step of.
3. according to the method for claim 2, it is characterised in that methods described also includes:
Determine the load of the distributed file system;
Verification switch is preset according to corresponding to the height of the load opens W module, the W is the positive integer no more than N.
4. according to the method for claim 3, it is characterised in that described that W module pair is opened according to the height of the load
The default verification switch answered includes:
The importance of N number of module is sorted according to principle from high to low;
According to the height of the load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
5. according to the method for claim 4, it is characterised in that when the M is 1, the default verification switch is to open
State;
When the M is N, the default verification switch is opening.
6. the method according to any one of claim 2 to 5, it is characterised in that methods described also includes:
If the default region of memory do not store it is described first verification and, or the module M default verification switch do not open, or
Second verification and with the described first verification and identical, then first data are sent to module M+K, the K for -1 or
1。
7. according to the method for claim 6, it is characterised in that methods described also includes:
When the default region of memory do not store first verification and when, in the verification of default storage region storage second
With, or storage it is described second verification and with default magic number, the first data length of first data, first data it is pre-
If at least one of first sampled data of position, and described second is verified and as the described first verification and.
8. according to the method for claim 7, it is characterised in that when the default storage region is stored with first verification
During with the second data length with the described first verification and corresponding second data, the is generated using first data described
With before, methods described also includes for two verifications:
Detect whether second data length changes;
If it is not, then trigger it is described using first data generation second verification and the step of.
9. according to the method for claim 8, it is characterised in that when the default storage region is also stored with the detection in advance
If during magic number, before whether detection second data length changes, methods described also includes:
Detect whether the default magic number changes;
If it is not, the step of whether detection second data length changes then triggered.
10. according to the method for claim 9, it is characterised in that when the default storage region is also stored with described second
During the second sampled data of the predeterminated position of data, if it is described second verification and with described first verification and it is identical,
Then first data, which are sent to module M+K, includes:
If it is described second verification and with described first verification and it is identical, by second sampled data and first hits
According to being contrasted;
If the second sampled data is identical with the first sampled data, first data are sent to module M+K.
11. one kind checking device, applied to the distributed file system designed based on stack module, the distributed field system
System includes N number of module, and the N is the positive integer not less than 2, it is characterised in that including:
First detection unit, for when module M receives the first data, detect whether default region of memory is stored with described the
First verification corresponding to one data and, the M is positive integer no more than N;
Generation unit, for when the default region of memory be stored with it is described first verification and when, then utilize first data
Generation second verification and;
Comparison unit, for being verified described second and verifying and contrasted with described first;
First determining unit, for when described second verifies and verify and differ with described first, it is determined that described first
There is mistake in the module M in data.
A kind of 12. computer installation, it is characterised in that:The computer installation includes processor, and the processor is used to perform
Realized during the computer program stored in memory as described in any one in claim 1 to 10 the step of verification method.
13. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that:The computer program
Realized when being executed by processor as described in any one in claim 1 to 10 the step of verification method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711059135.5A CN107844714B (en) | 2017-11-01 | 2017-11-01 | Verification method and device, computer device and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711059135.5A CN107844714B (en) | 2017-11-01 | 2017-11-01 | Verification method and device, computer device and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107844714A true CN107844714A (en) | 2018-03-27 |
CN107844714B CN107844714B (en) | 2021-04-09 |
Family
ID=61681288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711059135.5A Active CN107844714B (en) | 2017-11-01 | 2017-11-01 | Verification method and device, computer device and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107844714B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109376031A (en) * | 2018-09-27 | 2019-02-22 | 潍柴动力股份有限公司 | A kind of method and device for preventing the verification erroneous judgement of the memory block EEPROM from occurring |
CN110955916A (en) * | 2018-09-26 | 2020-04-03 | 深信服科技股份有限公司 | Data integrity protection method, system and related equipment |
CN111241005A (en) * | 2020-01-09 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Key value pair-based safe partition storage method and system |
CN111459496A (en) * | 2020-04-07 | 2020-07-28 | 珠海格力电器股份有限公司 | Method for generating tamper-proof program file and method for upgrading equipment |
CN113110697A (en) * | 2021-04-16 | 2021-07-13 | 深圳市富视康智能股份有限公司 | Time calibration method, device, equipment and storage medium |
CN115150024A (en) * | 2022-09-02 | 2022-10-04 | 无锡沐创集成电路设计有限公司 | Data processing method, device, equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120096270A1 (en) * | 2007-11-06 | 2012-04-19 | Men Long | End-to-end network security with traffic visibility |
CN104219027A (en) * | 2014-09-05 | 2014-12-17 | 四川长虹电器股份有限公司 | Distributed file security storage system capable of correcting file transmission error and method of system |
CN104410493A (en) * | 2014-11-07 | 2015-03-11 | 南方电网科学研究院有限责任公司 | Secure data storage method and secure data read method based on distributed system infrastructure |
CN104468035A (en) * | 2014-11-13 | 2015-03-25 | 北京航空航天大学 | Distributed type POS data reliability transmission system and method |
CN107070613A (en) * | 2017-03-22 | 2017-08-18 | 公安部交通管理科学研究所 | Reliable data transmission method under distributed network environment |
US20170249199A1 (en) * | 2016-02-26 | 2017-08-31 | Red Hat, Inc. | Correlation-Based Monitoring and Events for a Unified Storage Manager |
-
2017
- 2017-11-01 CN CN201711059135.5A patent/CN107844714B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120096270A1 (en) * | 2007-11-06 | 2012-04-19 | Men Long | End-to-end network security with traffic visibility |
CN104219027A (en) * | 2014-09-05 | 2014-12-17 | 四川长虹电器股份有限公司 | Distributed file security storage system capable of correcting file transmission error and method of system |
CN104410493A (en) * | 2014-11-07 | 2015-03-11 | 南方电网科学研究院有限责任公司 | Secure data storage method and secure data read method based on distributed system infrastructure |
CN104468035A (en) * | 2014-11-13 | 2015-03-25 | 北京航空航天大学 | Distributed type POS data reliability transmission system and method |
US20170249199A1 (en) * | 2016-02-26 | 2017-08-31 | Red Hat, Inc. | Correlation-Based Monitoring and Events for a Unified Storage Manager |
CN107070613A (en) * | 2017-03-22 | 2017-08-18 | 公安部交通管理科学研究所 | Reliable data transmission method under distributed network environment |
Non-Patent Citations (1)
Title |
---|
申爱花: "基于分布式文件系统GlusterFS的安全技术研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110955916A (en) * | 2018-09-26 | 2020-04-03 | 深信服科技股份有限公司 | Data integrity protection method, system and related equipment |
CN110955916B (en) * | 2018-09-26 | 2023-09-05 | 深信服科技股份有限公司 | Data integrity protection method, system and related equipment |
CN109376031A (en) * | 2018-09-27 | 2019-02-22 | 潍柴动力股份有限公司 | A kind of method and device for preventing the verification erroneous judgement of the memory block EEPROM from occurring |
CN109376031B (en) * | 2018-09-27 | 2022-10-25 | 潍柴动力股份有限公司 | Method and device for preventing error judgment of check of EEPROM storage area |
CN111241005A (en) * | 2020-01-09 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Key value pair-based safe partition storage method and system |
CN111459496A (en) * | 2020-04-07 | 2020-07-28 | 珠海格力电器股份有限公司 | Method for generating tamper-proof program file and method for upgrading equipment |
CN113110697A (en) * | 2021-04-16 | 2021-07-13 | 深圳市富视康智能股份有限公司 | Time calibration method, device, equipment and storage medium |
CN115150024A (en) * | 2022-09-02 | 2022-10-04 | 无锡沐创集成电路设计有限公司 | Data processing method, device, equipment and medium |
CN115150024B (en) * | 2022-09-02 | 2022-11-18 | 无锡沐创集成电路设计有限公司 | Data processing method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN107844714B (en) | 2021-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107844714A (en) | A kind of verification method and device, computer installation, readable storage medium storing program for executing | |
CN109491905A (en) | Head end test method, apparatus and electronic equipment | |
CN110502374A (en) | The traffic capture debugging tool of the basic reason of equipment fault when identification is tested automatically | |
CN110334007A (en) | A kind of functional interface calls verification method and device, electronic equipment and storage medium | |
CN105975726A (en) | Verification method and platform based on SystemVerilog language | |
CN109802864A (en) | Chip design and verification method, device and chip tester | |
CN109033772A (en) | A kind of input method and device of verification information | |
CN105022694B (en) | Method for generating test case and system for mobile terminal test | |
CN109189405A (en) | A kind of method and system of proving program Flash data consistency | |
US20080008021A1 (en) | Method for recognizing and verifying fifo structures in integrated circuit designs | |
CN110442513A (en) | Execution method, apparatus, computer equipment and the storage medium of functional test use-case | |
CN109358993A (en) | The processing method and processing device of deep neural network accelerator failure | |
CN109445837A (en) | A kind of dissemination method and equipment of application program | |
CN107832208A (en) | The automatic test approach and terminal device of software | |
US7275231B2 (en) | High level validation of designs and products | |
CN107850641A (en) | The whole-system verification of on-chip system (SoC) | |
CN101681392A (en) | Constrained random simulation coverage closure guided by a cover property | |
CN107966648B (en) | A kind of embedded failure diagnosis method based on correlation matrix | |
CN109766259A (en) | A kind of classifier test method and system based on compound transformation relationship | |
CN109376079A (en) | The test method and server that interface calls | |
CN110515755A (en) | Interface function verification method, device, equipment and computer readable storage medium | |
CN107451058A (en) | A kind of software development methodology and device | |
CN110399304A (en) | A kind of test method and system of script | |
CN104700900B (en) | A kind of detecting system and method for memory Single event upset effecf | |
CN104780123B (en) | A kind of network pack receiving and transmitting processing unit and its design method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |